Empirical analysis of denial-of-service attacks in the bitcoin ecosystem M Vasek, M Thornton, T Moore Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014 | 307 | 2014 |
There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams M Vasek, T Moore Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 287 | 2015 |
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools B Johnson, A Laszka, J Grossklags, M Vasek, T Moore Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014 | 283 | 2014 |
Analyzing the Bitcoin Ponzi scheme ecosystem M Vasek, T Moore Financial Cryptography, 2018 | 150 | 2018 |
Measuring the changing cost of cybercrime R Anderson, C Barton, R Böhme, R Clayton, CH Ganan, T Grasso, M Levi, ... The 2019 workshop on the economics of information security, 2019 | 148 | 2019 |
An examination of the cryptocurrency pump-and-dump ecosystem JT Hamrick, F Rouhi, A Mukherjee, A Feder, N Gandal, T Moore, M Vasek Information Processing & Management 58 (4), 102506, 2021 | 137* | 2021 |
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets M Vasek, J Bonneau, R Castellucci, C Keith, T Moore Financial Cryptography and Data Security, 2016 | 77* | 2016 |
Do malware reports expedite cleanup? An experimental study M Vasek, T Moore USENIX Association 37 (6), 2012 | 71 | 2012 |
Hacking is not random: a case-control study of webserver-compromise risk M Vasek, J Wadleigh, T Moore IEEE Transactions on Dependable and Secure Computing 13 (2), 206-219, 2015 | 49 | 2015 |
Identifying risk factors for webserver compromise M Vasek, T Moore Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 40 | 2014 |
The rise and fall of cryptocurrency coins and tokens N Gandal, JT Hamrick, T Moore, M Vasek Decisions in Economics and Finance 44 (2), 981-1014, 2021 | 38 | 2021 |
The age of cryptocurrency M Vasek Science 348 (6241), 1308-1309, 2015 | 29 | 2015 |
Measuring the impact of sharing abuse data with web hosting providers M Vasek, M Weeden, T Moore Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 22 | 2016 |
Representing expressive types in blocks programming languages M Vasek Wellesley College., 2012 | 18 | 2012 |
The rise and fall of cryptocurrencies A Feder, N Gandal, JT Hamrick, T Moore, M Vasek Workshop on the economics of information security, 2018 | 16 | 2018 |
Detecting text reuse in cryptocurrency whitepapers A Morin, M Vasek, T Moore 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-5, 2021 | 13 | 2021 |
Empirical analysis of factors affecting malware URL detection M Vasek, T Moore 2013 APWG eCrime Researchers Summit, 1-8, 2013 | 9 | 2013 |
“Invest in crypto!”: An analysis of investment scam advertisements found in Bitcointalk GA Siu, A Hutchings, M Vasek, T Moore 2022 APWG symposium on electronic crime research (eCrime), 1-12, 2022 | 8* | 2022 |
Analyzing target-based cryptocurrency pump and dump schemes JT Hamrick, F Rouhi, A Mukherjee, M Vasek, T Moore, N Gandal Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and …, 2021 | 6 | 2021 |
DeFi Deception: Uncovering the prevalence of rugpulls in cryptocurrency projects S Agarwal, G Atondo-Siu, M Ordekian, A Hutchings, E Mariconti, M Vasek Financial Cryptography and Data Security, 2023 | 5* | 2023 |